Abstract
Fiber-optic network infrastructures are crucial for the transmission of data over long and short distances. Fiber optics are also preferred for the infrastructure of in-building data communications. In this study, we use polarization analysis to ensure the security of the optical fiber/cables of the physical layer. This method exploits the changes induced by mechanical vibrations to polarization states, which can be easily detected using a polarization beam splitter and a balancing photodetector. We use machine learning to classify selected events that violate the safety of the physical layer, such as manipulation or temporary disconnection of connectors. The results show the resting state can be accurately distinguished from selected security breaches for a fiber route subjected to environmental disturbances, where individual events can be classified with nearly 99% accuracy.
1. Introduction
Most optical sensor systems are based on reflectometry or interferometry principles and are highly sensitive and accurate, but also extremely expensive. Systems based on commercial polarimeters can accurately measure polarization in optical fibers, but are costly and mostly have a low sampling rate [1]. Detection systems based on a simple analysis of changes in polarization states are a cost-effective solution that can be easily implemented for current security systems. Problems with data processing are also encountered using optical sensor systems. Algorithms have been developed that can increase the signal-to-noise ratio [2,3], filter signals [4,5], or amplify signals [6]. A threshold is then used mainly to determine the increase in the vibration intensity, which is suitable only for a certain type of event that occurs close to the optical fiber. The measurement results of polarization changes are therefore highly inaccurate. The measurement accuracy can be increased by using a simple polarization analyzer and a data acquisition device in conjunction with machine learning algorithms to identify changes in polarization states. It is important to process the data acquired from the polarization analyzer by using advanced event classification techniques rather than thresholding. The most suitable classification techniques involve the use of machine learning algorithms, which can also determine the type of event that occurs in the vicinity of a measured optical fiber.
2. Related Studies
Several technologies can be used to protect the physical layer consisting of optical fibers/cables. In [7], it was noted that most common attacks on the physical layer of fibers involve touching the fiber. Thus, vibration detection can be used to ensure the security of the physical layer consisting of optical fibers/cables. Special fibers, such as fiber Bragg gratings (FBG), can be used for vibration detection. These systems are very often used to provide perimeter security, such as in [8,9]. Vibrations in the secure zone can thus be detected, but unfortunately, the use of special fibers with Bragg gratings is necessary. Thus, FBG cannot be used in a real infrastructure.
Another potential technique for ensuring fiber security is distributed acoustic sensing (DAS) based on Φ-OTDR. These systems are very accurate and enable localization of events and measurements over long distances, while being complex, robust, and costly [3,10]. Consequently, these systems are often used to secure critical infrastructures [11,12].
Another option is to measure vibrations using interferometers. The most commonly used techniques employ the Mach–Zehnder interferometer (MZI), which can be used, for example, to secure gas turbines [13]; the Michelson interferometer (MI), which is commonly used for perimeter security [14]; or the Sagnac interferometer (SI), which is also used for perimeter security [15,16]. The use of the MZI and MI requires the use of reference fibers [17], which can be complex to implement in real infrastructures. Interferometric methods are very sensitive and hence can be disturbed by common traffic sounds near real cables in buildings (banging doors; noise from heating, ventilation, and air conditioning (HVAC); people moving in buildings, etc.).
An example of the enhanced sensitivity of interferometers is provided in [18] by comparison to the sensitivity of polarization detection, which constitutes another large group of sensing techniques based on the detection of polarization changes in a fiber. For example, polarization analysis can be performed using polarization-sensitive optical time domain reflectometry (POTDR) based on Rayleigh light scattering [19]. Another possibility is to use a polarimeter to measure the polarization of the light and use machine learning to detect polarization changes [20] or to use a polarization beam splitter (PBS) and a balanced photodetector (BPD) to directly measure polarization changes [21,22]. Measurements using a PBS can also be incorporated into reflectometry methods [23], that is, PBS can be used for POTDR sensing.
Sensing systems based on polarization detection appear to be an ideal solution because of low acquisition costs. These systems could be easily integrated into real infrastructures, either by employing unused fibers in cables or wavelength-division multiplexing in fiber networks with active data traffic. Paradoxically, these systems are less sensitive than interferometers and are therefore more robust to real-world conditions.
It has been proven in many research studies that optical networks are vulnerable to eavesdropping attacks [7,24,25]. However, various fiber optics sensing systems can detect or even localize the attacker. These methods can be extended by using machine learning algorithms to improve attacker detection. One example is a detection-and-localization system based on optical time domain reflectometry (OTDR) combined with a convolutional neural network [26] or a recurrent autoencoder neural network [27]. These methods achieved almost 100% accuracy in attacker detection and localization, demonstrating the efficacy of such a solution. A different approach is to focus on attacker detection without localization to reduce the size and price of the proposed solution. This kind of system can analyze optical side-channel information, such as transmission parameters obtained from eye diagrams using convolutional neural networks [28], or analyze polarization changes using simple threshold algorithms and data processing [29].
3. Methodology
The propagation of light can be described as a transverse electromagnetic wave with perpendicular electric and magnetic components. The propagation of these components can be described by Maxwell’s equations. Such a wave can be described as a superposition of two orthogonal and linearly polarized components along the x- and y-axes, where the respective amplitudes and initial phases are given by [30]
where , n is the refractive index, is the wavelength, z is the direction of propagation, and a and are the amplitude and the initial phase, respectively [30].
The graphic progression is shown in Figure 1 [17].
Figure 1.
Polarization components of an electromagnetic wave E.
Equation (1) can then be written using a Jones vector representation as a matrix (column vector) [31]:
The polarization of light can also be described by Stokes parameters, which are defined as
where denotes the intensity of the light beam and and represent the transmitted intensities of a beam passing through a linear horizontal polarizer (LHP), a linear vertical polarizer (LHP), and a right-circular and left-circular polarizer, respectively.
Stokes parameters are very often represented by Stokes vectors represented by the matrix [32]:
Figure 2 shows a Poincaré sphere as a measure of the current state of polarization or the evolution of polarization over time. The V(S) and H(F) markings on the axes show the values of vertical and horizontal polarization on the fast or slow axis, respectively. The other axes represent the right- and left-circled axes [33].
Figure 2.
Poincaré sphere used to represent polarization rotation.
The polarization can be defined in terms of three basic states, i.e., linear, circular and elliptical [30].
- Linear—electric field concentrated in one plane along the direction of propagation.
- Circular—the electric field consists of two mutually perpendicular components with the same amplitude that are shifted by a phase .
- Elliptic—The electric field can be described by an ellipse due to the different amplitudes and/or different phases of the components.
As mentioned in Section 2, vibrations around an optical fiber affect the polarization and can be measured in two ways. One option is to use a polarimeter to measure the current polarization state or to use a PBS to directly detect polarization changes. As we are designing our system to provide cost-effective security for a physical layer, it is more suitable and cheaper to use a polarization splitter to split the beam and then detect two separate orthogonal planes using a BPD [34,35].
We split the polarization into two planes and determine the signal intensity for both planes, where there are no changes at rest, i.e., the signal intensities in the two planes are probably different but constant. The action of an external force on the fiber changes the rotation of the polarization, thereby changing the ratio of the polarizations in the orthogonal planes. This change is detected by the BPD, which senses both planes and differentiates the signal. Even if there is a permanent change in the polarization, the proposed system will not be affected because the signal intensities from the PBS will also stabilize once the new state of polarization has stabilized. The resulting signal from the BPD is thus very similar to an audio mono signal, which would simplify conversion to this format.
4. Experimental Setup
The experimental setup used to test the proposed system consists of two parts. The first part is used for computation and consists of a computer and a device for sensing audio signals. The second part is an optical system with a laser source (a low-noise DFB laser with a 1550-nm wavelength and a typical spectral linewidth of 3 MHz), a PBS and a BPD (composed of InGaAs photodiodes with wavelengths of 900–1700 nm and a signal bandwidth of 100 MHz at 3 dB). The entire setup is located in a server room, from which an optical fiber leads out of the building within the test infrastructure. The whole design is shown in Figure 3, where the optical connections are marked in black, orange and blue. Signal and power connections are marked in red.
Figure 3.
Schematic of the experimental setup.
The computation section (marked in blue) originally consisted of a server and a myRIO DAQ board. However, the insufficiently low sampling rate of 8 bits/20 kHz resulted in the introduction of large errors into the measurements. To optimize the computing power and device size, the server was replaced by a microcomputer UP Board UP 4000 series with an Intel Pentium processor and 8 GB of RAM. The myRIO board was also replaced by an external sound card with a sampling rate of up to 24 bits/192 kHz. The final computational section is marked in green. The modified section ensures that the whole setup is almost pocket size.
A total of 3 ADCs were used for the measurements. A myRIO ADC board was used for signal conversion in the first version of the setup and was replaced in the second version by 2 external sound cards—Startech ICUSBAUDIO2D and Native Instruments Komplete Audio 2, with sampling rates of up to 96 kHz and 192 kHz, respectively. The most current version of the experimental setup is shown in Figure 4.
Figure 4.
Final version of the sensor system with real hardware.
In [7], attacks on the physical layer are mainly considered to occur through tampering with an optical fiber. Therefore, measurement scenarios based on such situations were investigated. Measurements were performed under several scenarios. Specifically, direct manipulation of a fiber by touching and knocking, opening and closing of a manhole cover, disconnection of the fiber (which is particularly crucial for the safety of transmissions), and idle measurements were performed.
Measurements are performed on an optical fiber that passes through an entire building and then out around a road, as shown in Figure 5. The length of the optical route is approximately 2 km. There are many interference-producing elements along the fiber route. The measurement setup is located in a server room with a continuously operating HVAC. The fiber route passes above the ceiling along the corridor with a high turnover of people, continues to the lower floors of the building around a vertical riser, and then moves to an exterior manhole near the parking lot. The manhole is accessible to an operator or attacker, and the fiber is also accessible from the road along the fiber route to the server room. The proposed system targets direct manipulation in the vicinity of the cable/fiber by an attacker. The sensitivity of the system enables monitoring even in heavily disturbed surroundings and, therefore, in places where an interferometer could not be used because of high sensitivity.
Figure 5.
Drawing of a test route on a university polygon used to simulate a real infrastructure.
5. Neural Network Architecture and Training
A neural network design consists of a simple architecture based on dense layers that can be easily offloaded into embedded systems for real-time analysis. The input layer has 8192 neurons (The window size is the optimal value considering the spectral resolution and computational difficulty.) to match the window-size generating spectrum vectors. The output layer matches the number of classes, which is equal to 5. The only optimized part is the middle layer. Based on the results of several experiments, the optimal number of neurons in this layer is 512. The activation function used between each layer is sigmoid, but the last layer uses a softmax function. The whole neural network and training are implemented using the PyTorch framework with graphics processing unit acceleration [36].
5.1. Dataset
The system described in Section 4 for analyzing changes in the polarization state is deployed to obtain a dataset. The system provides one-dimensional data in the time domain with a sampling rate of 44.1 kS/s that are not suitable for further analysis [29]. Therefore, the data are converted to the frequency domain using a single-side fast Fourier transform (FFT) and normalized by subtracting the mean value from each spectral vector.
Each abnormal event in the dataset is marked by starting and ending points, thereby generating arrays of different lengths for events. The data array for the FFT is generated by a sliding window with a size of 8192 elements that is shifted to 820 elements after each generated window. Thus, several spectral vectors are produced for each labeled abnormal event.
The dataset labels are converted into one-hot encoding, which a neural network can use to solve a classification problem.
The dataset is divided into three subsets in a ratio of 80:10:10 (This ratio is chosen to match the 10-fold cross-validation method described in Section 5.2.) as shown in Table 1. The training subset is used directly to modify the neural network weights, the validation subset only evaluates the loss of the neural network during learning to prevent overfitting, and the test subset is used only once after learning to evaluate the metrics and performance of the trained neural network.
Table 1.
The number of dataset samples per subset and label.
Considering the problem to be solved and the neural network output, training is performed using the categorical cross-entropy loss function, which is defined as [37]
where y is a true label, is a predicted output and N is the number of classes.
Table 1 clearly shows that the dataset is imbalanced. Therefore, the loss function is further enhanced using class weights to scale the output loss [38]. This modification decreases the losses for large classes and increases the losses for small classes.
5.2. Training
In the training process, 10-fold cross-validation is used to splits the dataset into 10 distinct subsets. Thus, the training is repeated 10 times, where the training, validation, and testing subsets vary according to the cross-validation method. In each iteration, the training process uses the Adam [39] gradient descent algorithm with a learning rate of for 50 epochs. The number of epochs is evaluated in advance by using an early stopping mechanism to prevent overfitting. The learning process is terminated if the validation loss does not improve for more than 10 epochs. The proposed model contains 2,100,741 trainable parameters requiring approximately 5 seconds per epoch.
In Figure 6, the mean values of the accuracy and loss metrics for all the learning processes are shown by solid lines, and the 25th and 75th quantiles in each epoch are highlighted in the background. The training curves have low errors and converge to the lowest loss. By comparison, the validation curves, particularly the validation loss curve, have higher errors resulting from the use of the cross-entropy loss with class weights. A classification accuracy of almost 99% is achieved for both datasets. The performance evaluation for the test dataset is described in Section 6.
Figure 6.
Evolution of the loss (a) and accuracy (b) over learning epochs with 10-fold cross-validation, where the line indicates the median values and the filled surroundings indicate the 25th and 75th quantiles for each epoch.
6. Results and Discussion
The measured results can be used to identify individual events. For example, fiber manipulation has a very significant effect on the acquired signal, as shown in Figure 7. This event can be observed in both the time domain (see Figure 7a) and the frequency domain (see Figure 7b), which is primarily used for machine learning and dataset labeling. The frequency domain is mainly used for labeling to improve visibility of events, such as knocking on a manhole. The visibility of these events need to be improved because the events only affect the polarization slightly.
Figure 7.
Example of a signal indicating two events of manipulation of fibers in a manhole.
As signal changes are visible on all acquisition devices, we performed an experiment to qualitatively assess the accuracy of the proposed method.
To compare the ADCs, a method was used to calculate the SNR in the frequency domain (i.e., the SNR was compared at each frequency in a predefined test signal, where sine functions were generated at a given frequency for 0.7 s, where the frequency increased in 1/12-octave steps). Figure 8 shows that the sound cards have a higher SNRfthan the myRIO board.
Figure 8.
Comparison of the SNR in the frequency domain for myRIO and sound cards.
The parameters of each converter are presented in Table 2. Most sound cards use delta–sigma converters, whereas myRIO integrates an XADC directly into a Zynq 7010 processor. Thus, myRIO has a lower SNRf and bit resolution than sound cards.
Table 2.
Parameters and prices of acquisition boards.
We can easily compute the SNRf for a specific frequency f as
where is the sine signal with a given frequency and is the acquired signal. The value of the SNRf is expressed in decibels. Thus, it can be concluded that a sound card is more suitable for acquiring data than myRIO.
The aforementioned conclusion is confirmed by the spectrogram of the acquired signals shown in Figure 9. At first glance, the spectrum of the signal acquired by myRIO only contains frequencies up to 2 kHz, whereas higher frequencies appear in the spectrum of the signal obtained using the sound card. Both spectrograms contain strongly colored low frequencies. In myRIO, the higher frequencies are captured with very weak intensities or not at all, whereas higher frequencies are more prominent in the spectrum obtained using the Startech sound card. For this reason, we used the sound card data for machine learning. The steps at higher frequencies are generally clearly visible because the spectrum is computed using the partial frequencies in the test signal, i.e., equidistant frequencies are not used. This effect becomes more pronounced at higher frequencies because of the logarithmic nature of the steps.
Figure 9.
Spectrogram of test signals acquired by myRIO (a) and Startech (b).
The classification performance is estimated using a confusion matrix evaluated on the test dataset, which is shown in Figure 10. The proposed method is 100% accurate for deciding between the regular-state samples and the rest of the samples corresponding to abnormal events. Therefore, the network should not produce any false alarms. Satisfactory accuracy is obtained for identifying the remaining classes, except for the Knocking class, which is misclassified with Manipulation. An in-depth analysis shows that Manipulation events also contain knocking events, particularly at the beginning.
Figure 10.
Confusion matrix evaluated on the testing dataset after learning, which shows the true performance of the proposed event classification method.
Unfortunately, the designed system cannot directly locate the origin of vibrations. It is possible to indirectly locate some types of vibration based on the known route along which the fiber is deployed. An example is the disconnection and possible reconnection of a fiber, which in our case can only occur in the server room, because there are no connectors elsewhere along the fiber route. Rack door disruption can also be determined by a class extension (e.g., the opening of a rack door in Server Room 1 and the opening of a door in Server Room 2) because server rooms frequently have different designs (e.g., sliding doors vs. opening doors).
The simultaneous classification of two different phenomena can also occur under real conditions, which we will investigate in the future. Primarily, we will extend the datasets while modifying machine learning algorithms, especially concerning frequency analysis, because events are frequency specific.
A unique feature of the proposed system is that polarization detection is used for protecting the physical layer and complemented by using machine learning algorithms for event classification, enabling the system to be easily deployed. The greatest advantages of the proposed system are a low cost, the ability to be deployed in real infrastructure, and compactness. The system can sense unused fiber in a cable to ensure the security of the entire cable. In the future, we would like to perform wavelet multiplexing or data traffic analysis.
7. Conclusions
In this article, the problem of vibration detection using optical fibers was described, and a complete system was designed and tested for detecting disturbances to a physical layer by measuring polarization changes using a PBS. The feasibility of securing a physical layer by a vibration detection system has been demonstrated, and events have been classified using a simple neural network based only on dense layers for potential attempts to violate the integrity of a physical layer consisting of optical fibers and cables. Experimental results prove that our proposed cost-effective system can prevent simple attempts at security breaches. The system can classify events with an accuracy of nearly 99%.
Author Contributions
Conceptualization, M.R. and P.D.; methodology, P.D. and V.S.; software, M.R., A.T. and P.D.; validation, V.S., P.D., A.T. and P.M.; formal analysis, P.M. and P.D.; investigation, M.R., L.J. and P.D.; resources, M.R., L.J., P.D. and V.S.; data curation, P.D. and V.S.; writing—original draft preparation, M.R., L.J., P.D. and P.M.; writing—review and editing, P.D., A.T. and P.M.; visualization, V.S., A.T. and P.D.; supervision, P.M.; project administration, M.R.; funding acquisition, M.R. All authors have read and agreed to the published version of the manuscript.
Funding
The work was supported by the Grant Research in the field of fiber optic monitoring systems using advanced data processing techniques (FEKT-K-22-7731) realized within the project Quality Internal Grants of BUT (KInG BUT), Reg. No. CZ.02.2.69/0.0/0.0/19_073/0016948, which
is financed from the OP RDE. This work was partially supported by the Ministry of the Interior
of the Czech Republic, program Security Research, under grant Cyber security of fiber photonic
infrastructures—CEFON, no. VJ01030012.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data that support the findings of this study are available from the corresponding author upon reasonable request.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Dejdar, P.; Hanak, P.; Munster, P.; Horvath, T. Polarization Monitor for High-speed State of Polarization Changes Detection. Int. J. Adv. Telecommun. Electrotech. Signals Syst. 2021, 10, 13–17. [Google Scholar] [CrossRef]
- Li, J.; Zhou, X.; Zhang, M.; Zhang, J.; Qiao, L.; Zhao, L.; Yin, Z. Temperature Resolution Improvement in Raman-Based Fiber-Optic Distributed Sensor Using Dynamic Difference Attenuation Recognition. Sensors 2020, 20, 6922. [Google Scholar] [CrossRef]
- Dejdar, P.; Záviška, P.; Valach, S.; Münster, P.; Horváth, T. Image Edge Detection Methods in Perimeter Security Systems Using Distributed Fiber Optical Sensing. Sensors 2022, 22, 4573. [Google Scholar] [CrossRef]
- Ershov, I.A.; Stukach, O.V. Choice of Wavelet for Filtering of Signal from Fiber-Optic Temperature Sensor. In Proceedings of the 2022 Moscow Workshop on Electronic and Networking Technologies (MWENT), Moscow, Russia, 9–11 June 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Zhou, R.; Gao, H.; Feng, Z.; Qiao, X. Simulation and hardware implementation of demodulation for fiber optic seismic sensor with linear edge filtering method. Opt. Fiber Technol. 2020, 60, 102384. [Google Scholar] [CrossRef]
- Lou, K.; Peng, C.Y.; Tang, W.S.; Hu, Z.L.; Xu, P.; Tie, X. Application of Acoustic Horns for the Amplification of Fiber Optic Vector Hydrophone Signal. In Proceedings of the 2021 4th International Conference on Information Communication and Signal Processing (ICICSP), Shenzhen, China, 26–28 November 2021; pp. 139–142. [Google Scholar] [CrossRef]
- Spurny, V.; Munster, P.; Tomasov, A.; Horvath, T.; Skaljo, E. Physical layer components security risks in optical fiber infrastructures. Sensors 2022, 22, 588. [Google Scholar] [CrossRef] [PubMed]
- Liu, F.; Zhang, H.; Li, X.; Li, Z.; Wang, H. Intrusion identification using GMM-HMM for perimeter monitoring based on ultra-weak FBG arrays. Opt. Express 2022, 30, 17307–17320. [Google Scholar] [CrossRef] [PubMed]
- Wang, M.; Sun, Z.; Zhang, F.; Min, L.; Li, S.; Jiang, S. Application Research of FBG Vibration Sensor Used for Perimeter Security. In Proceedings of the 2018 IEEE 3rd Optoelectronics Global Conference (OGC), Shenzhen, China, 4–7 September 2018; pp. 94–97. [Google Scholar] [CrossRef]
- Cai, Y.; Yan, W.; Liu, H.; Sun, Y.; Zhou, X. Security monitoring of smart campus using distributed fiber optic acoustic sensing. In Proceedings of the AOPC 2020: Optical Information and Network; Zhang, J., Fu, S., Zhang, H., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2020; Volume 11569, p. 115690L. [Google Scholar] [CrossRef]
- Duckworth, G.L.; Ku, E.M. OptaSense distributed acoustic and seismic sensing using COTS fiber optic cables for infrastructure protection and counter terrorism. In Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XII; Carapezza, E.M., Ed.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2013; Volume 8711, p. 87110G. [Google Scholar] [CrossRef]
- Kishida, K.; Imai, M.; Kawabata, J.; Guzik, A. Distributed Optical Fiber Sensors for Monitoring of Civil Engineering Structures. Sensors 2022, 22, 4368. [Google Scholar] [CrossRef]
- Stepanov, K.V.; Zhirnov, A.A.; Sazonkin, S.G.; Pnev, A.B.; Bobrov, A.N.; Yagodnikov, D.A. Non-Invasive Acoustic Monitoring of Gas Turbine Units by Fiber Optic Sensors. Sensors 2022, 22, 4781. [Google Scholar] [CrossRef]
- Shi, J.; Cui, K.; Wang, H.; Ren, Z.; Zhu, R. An Interferometric Optical Fiber Perimeter Security System Based on Multi-Domain Feature Fusion and SVM. IEEE Sens. J. 2021, 21, 9194–9202. [Google Scholar] [CrossRef]
- Gu, X.; Wang, T.; Hou, S.; Peng, J.; Wang, H.; Xia, Q. Multi-Feature-Based Intrusion Detection for Optical Fiber Perimeter Security System: A Aase Study. In Proceedings of the 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Berkeley, CA, USA, 16–18 July 2018; pp. 448–453. [Google Scholar] [CrossRef]
- Wang, N.; Fang, N.; Wang, L. Intrusion recognition method based on echo state network for optical fiber perimeter security systems. Opt. Commun. 2019, 451, 301–306. [Google Scholar] [CrossRef]
- Yin, S.; Ruffin, P.B.; Yu, F.T.S. Fiber Optic Sensors, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2017; pp. 1–477, Cited By:11. [Google Scholar]
- Munster, P.; Horvath, T.; Vojtech, J. Distributed Sensing Based on Interferometry and Polarization Methods for Use in Fibre Infrastructure Protection. Sensors 2019, 19, 1810. [Google Scholar] [CrossRef] [PubMed]
- Yablochkin, K.A.; Dashkov, M.V.; Dashkov, V.M. Investigation of the vibration influences on the optical fiber polarization characteristics. In Proceedings of the Optical Technologies for Telecommunications 2018; Andreev, V.A., Bourdine, A.V., Burdin, V.A., Morozov, O.G., Sultanov, A.H., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2019; Volume 11146, p. 111461P. [Google Scholar] [CrossRef]
- Šlapák, M.; Vojtěch, J.; Havliš, O.; Slavík, R. Monitoring of Fibre Optic Links With a Machine Learning-Assisted Low-Cost Polarimeter. IEEE Access 2020, 8, 183965–183971. [Google Scholar] [CrossRef]
- Munster, P.; Horvath, T.; Sysel, P.; Vojtech, J.; Velc, R. Comparison of interferometry based and polarization based sensing systems for use in fiber infrastructure protection. In Proceedings of the 2017 International Workshop on Fiber Optics in Access Network (FOAN), Sarajevo, Bosnia and Herzegovina, 6–8 November 2017; pp. 1–3. [Google Scholar] [CrossRef]
- Wada, A.; Tanaka, S.; Takahashi, N. Simultaneous measurement of vibration and temperature using a Fabry-Perot interferometer in polarization maintaining fiber and laser diodes. In Proceedings of the 25th International Conference on Optical Fiber Sensors; Chung, Y., Jin, W., Lee, B., Canning, J., Nakamura, K., Yuan, L., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2017; Volume 10323, p. 1032326. [Google Scholar] [CrossRef]
- Wang, X.; Hu, J.; Wang, F.; Yong, Y.; Zhang, Y.; Xue, M.; Zhang, X.; Pan, S. Multi-vibration detection by probe pulses with ergodic SOPs in a POTDR system. Opt. Express 2018, 26, 28349–28362. [Google Scholar] [CrossRef] [PubMed]
- Shaneman, K.; Gray, S. Optical network security: Technical analysis of fiber tapping mechanisms and methods for detection & prevention. In Proceedings of the IEEE MILCOM 2004. Military Communications Conference, Monterey, CA, USA, 31 October–3 November 2004; Volume 2, pp. 711–716. [Google Scholar] [CrossRef]
- Skorin-Kapov, N.; Furdek, M.; Zsigmond, S.; Wosinska, L. Physical-layer security in evolving optical networks. IEEE Commun. Mag. 2016, 54, 110–117. [Google Scholar] [CrossRef]
- Song, H.; Li, Y.; Liu, M.; Wang, K.; Li, J.; Zhang, M.; Zhao, Y.; Zhang, J. Experimental study of machine-learning-based detection and location of eavesdropping in end-to-end optical fiber communications. Opt. Fiber Technol. 2022, 68, 102669. [Google Scholar] [CrossRef]
- Abdelli, K.; Cho, J.Y.; Azendorf, F.; Griesser, H.; Tropschug, C.; Pachnicke, S. Machine-learning-based anomaly detection in optical fiber monitoring. J. Opt. Commun. Netw. 2022, 14, 365–375. [Google Scholar] [CrossRef]
- Liu, M.; Li, Y.; Song, H.; Tu, Z.; Zhao, Y.; Zhang, J. Experimental Demonstration of Optical Fiber Eavesdropping Detection Based on Deep Learning. In Proceedings of the Asia Communications and Photonics Conference, Chengdu, China, 2–5 November 2019; Optical Society of America: Washington, DC, USA, 2019; p. T1H-4. [Google Scholar]
- Tomasov, A.; Dejdar, P.; Horvath, T.; Munster, P. Physical fiber security by the state of polarization change detection. In Proceedings of the Fiber Optic Sensors and Applications XVIII; Lieberman, R.A., Sanders, G.A., Scheel, I.U., Eds.; International Society for Optics and Photonics, SPIE: Orlando, FL, USA, 2022; Volume 12105, p. 1210507. [Google Scholar] [CrossRef]
- Kumar, A.; Ghatak, A. Basic Concepts of Polarization. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 19–46. [Google Scholar] [CrossRef]
- Kumar, A.; Ghatak, A. Jones Vector Representation of Polarized Light. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 75–97. [Google Scholar] [CrossRef]
- Kumar, A.; Ghatak, A. The Stokes Parameters Representation. In Polarization of Light with Applications in Optical Fibers; SPIE: Bellingham, WA, USA, 2011; pp. 97–120. [Google Scholar] [CrossRef]
- Padgett, M.J.; Courtial, J. Poincaré-sphere equivalent for light beams containing orbital angular momentum. Opt. Lett. 1999, 24, 430–432. [Google Scholar] [CrossRef] [PubMed]
- Dejdar, P.; Tomasov, A.; Munster, P.; Horvath, T. Vibration caused by train detection using state-of-polarization changes measurement. In Proceedings of the Fiber Optic Sensors and Applications XVIII; Lieberman, R.A., Sanders, G.A., Scheel, I.U., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2022; Volume 12105, p. 1210506. [Google Scholar] [CrossRef]
- Xiao, L.; Wang, Y.; Li, Y.; Bai, Q.; Liu, X.; Jin, B. Polarization Fading Suppression for Optical Fiber Sensing: A Review. IEEE Sens. J. 2022, 22, 8295–8312. [Google Scholar] [CrossRef]
- Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32; Curran Associates, Inc.: Red Hook, NY, USA, 2019; pp. 8024–8035. [Google Scholar]
- Semenov, A.; Boginski, V.; Pasiliao, E.L. Neural Networks with Multidimensional Cross-Entropy Loss Functions. In Proceedings of the International Conference on Computational Data and Social Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 57–62. [Google Scholar]
- Phan, T.H.; Yamamoto, K. Resolving class imbalance in object detection with weighted cross entropy losses. arXiv 2020, arXiv:2006.01413. [Google Scholar]
- Kingma, D.P.; Ba, J. Adam: A method for stochastic optimization. arXiv 2014, arXiv:1412.6980. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).